Certified Information Systems Auditor (CISA)

CISA, Certified Information Systems Auditor kelimelerinin kısaltmasıdır. Bu sertifika ile bireyler, BT sistemlerinin kontrol edilmesi ve korunması için yeterli bilgi ve tecrübe düzeyinde olduklarını kanıtlar. CISA sertifikası ile bireylerin tecrübeleri ve bilgileri uluslararası düzeyde tanınır ve sertifikaya hazırlanma sürecinde bilgi ve becerileri gelişir. CISA sertifikası ISACA tarafından (isaca.org) verilmektedir. ISACA, 1969 yılında kurulan ve dünya çapında 160'tan fazla ülkede 95,000'den fazla üyesi olan bir kurumlardandır. Dünya çapında CISA sertifikası 70,000'den fazla birey tarafından edinilmiştir. Eğitim dili Türkçe, eğitim materyalleri İngilizcedir. Eğitim kapsamında yukarıda belirtilen iş alanları işlenecek ve örnek sorular anlatılacak ve çözülecektir.

ISACA IT Audit and Assurance Standards, Guidelines and Tools and Techniques
Risk assessment in an audit context
Control Objectives related to in formation systems
Audit planning and management techniques
Gathering information and preserving evidence
Reporting and communication techniques
Control Objectives and IS-Related Controls
Risk Assessment in an Audit Context
Audit Planning and Management Techniques
Reporting and Communication Techniques
IT Governance Frameworks
IT strategy, policies, standards and procedures
Organizational structure roles and responsibilities related to IT
Quality Management systems
Maturity and business process re-engineering models
IT contracting strategies
Enterprise risk management
Process Improvement Models
IT Contracting Strategies
Monitoring and Reporting IT Performance
IT Human Resource Management
Business impact analysis
Business continuity planning
Benefits realization practices
Project governance mechanisms
Project management control frameworks, practices and tools
Risk management practices
Requirements analysis and management practices
System development methodologies and tools
Configuration and release management
System migration and infrastructure deployment practices
Post-implementation review objectives and practices
Service level management practices
Operations management
Technology concepts related to networks, system software and database management systems
System resiliency tools and techniques
Database administration practices
Capacity planning and monitoring techniques
Problem and incident management practices
Disaster recovery plans and testing methods
Security controls
Security incidents
Logical access controls
Network security controls
Network and Internet security
Attack methods and techniques
Security testing techniques
Encryption related technologies
PKI components and digital signature techniques
Security of mobile and wireless devices
Voice communications security
Data classification schemes
Physical access controls
Environmental protection devices
Process and procedures for information assets
Sizi Hemen Arayalım
Sizi Hemen Arayalım